Analysis
-
max time kernel
135s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 20:47
Static task
static1
Behavioral task
behavioral1
Sample
3bb67aac3eee2dd28d99522e55c66d05eb2de9af5ddaa14585630eb8fe0c5ed2.exe
Resource
win10v2004-20230220-en
General
-
Target
3bb67aac3eee2dd28d99522e55c66d05eb2de9af5ddaa14585630eb8fe0c5ed2.exe
-
Size
695KB
-
MD5
791333cde02a5fb562a6c0534752281f
-
SHA1
eea8a42a9c8f38922962c28bd2dc755c6f4ddc9d
-
SHA256
3bb67aac3eee2dd28d99522e55c66d05eb2de9af5ddaa14585630eb8fe0c5ed2
-
SHA512
bc0b87407f5d64749bb37d1ed43c57bdab8aecbdd4fa425a6e432649b6f83d8beb8d27004a80838aa02495276e343616cbfe70d3836cca4c7d1aad56ce114826
-
SSDEEP
12288:IMrzy906gTQYD0gneX8pfl88W1LJzhaZz2cv3eX+WvPSFzBgyJSKB0okH/qk:LyhpYDjeMfl8zkZfv3eX9yFB1Xk
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
from
176.113.115.145:4125
-
auth_value
8633e283485822a4a48f0a41d5397566
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4828.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4828.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4828.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4828.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4828.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4828.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4784-190-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4784-191-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4784-199-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4784-195-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4784-201-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4784-203-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4784-205-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4784-207-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4784-209-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4784-211-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4784-213-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4784-215-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4784-217-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4784-219-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4784-221-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4784-223-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4784-225-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/4784-227-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 2564 un966006.exe 1380 pro4828.exe 4784 qu9320.exe 1132 si232411.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4828.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4828.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3bb67aac3eee2dd28d99522e55c66d05eb2de9af5ddaa14585630eb8fe0c5ed2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3bb67aac3eee2dd28d99522e55c66d05eb2de9af5ddaa14585630eb8fe0c5ed2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un966006.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un966006.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1380 pro4828.exe 1380 pro4828.exe 4784 qu9320.exe 4784 qu9320.exe 1132 si232411.exe 1132 si232411.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1380 pro4828.exe Token: SeDebugPrivilege 4784 qu9320.exe Token: SeDebugPrivilege 1132 si232411.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 956 wrote to memory of 2564 956 3bb67aac3eee2dd28d99522e55c66d05eb2de9af5ddaa14585630eb8fe0c5ed2.exe 82 PID 956 wrote to memory of 2564 956 3bb67aac3eee2dd28d99522e55c66d05eb2de9af5ddaa14585630eb8fe0c5ed2.exe 82 PID 956 wrote to memory of 2564 956 3bb67aac3eee2dd28d99522e55c66d05eb2de9af5ddaa14585630eb8fe0c5ed2.exe 82 PID 2564 wrote to memory of 1380 2564 un966006.exe 83 PID 2564 wrote to memory of 1380 2564 un966006.exe 83 PID 2564 wrote to memory of 1380 2564 un966006.exe 83 PID 2564 wrote to memory of 4784 2564 un966006.exe 87 PID 2564 wrote to memory of 4784 2564 un966006.exe 87 PID 2564 wrote to memory of 4784 2564 un966006.exe 87 PID 956 wrote to memory of 1132 956 3bb67aac3eee2dd28d99522e55c66d05eb2de9af5ddaa14585630eb8fe0c5ed2.exe 88 PID 956 wrote to memory of 1132 956 3bb67aac3eee2dd28d99522e55c66d05eb2de9af5ddaa14585630eb8fe0c5ed2.exe 88 PID 956 wrote to memory of 1132 956 3bb67aac3eee2dd28d99522e55c66d05eb2de9af5ddaa14585630eb8fe0c5ed2.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\3bb67aac3eee2dd28d99522e55c66d05eb2de9af5ddaa14585630eb8fe0c5ed2.exe"C:\Users\Admin\AppData\Local\Temp\3bb67aac3eee2dd28d99522e55c66d05eb2de9af5ddaa14585630eb8fe0c5ed2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un966006.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un966006.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4828.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4828.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1380
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9320.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9320.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4784
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si232411.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si232411.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1132
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5b2a3259c7dd4ff9048779c413e09b3d7
SHA19bb9638e83afc9da611e3e05f6e7401f0061084c
SHA256ffa615d10a60cc3140d6ca434751ff967c92409798c728223bb1fed3d201d5e8
SHA51266e00931a60caf9bdefa4d1e34e98f167020d68c96bc1bf01c1e9b321a461c02d389badb2d29102acaa3a0efe3c4c4b1781578c71b75e49e6537a1ea4a3f0baf
-
Filesize
175KB
MD5b2a3259c7dd4ff9048779c413e09b3d7
SHA19bb9638e83afc9da611e3e05f6e7401f0061084c
SHA256ffa615d10a60cc3140d6ca434751ff967c92409798c728223bb1fed3d201d5e8
SHA51266e00931a60caf9bdefa4d1e34e98f167020d68c96bc1bf01c1e9b321a461c02d389badb2d29102acaa3a0efe3c4c4b1781578c71b75e49e6537a1ea4a3f0baf
-
Filesize
553KB
MD5f103bc66547f77ec89c00337b7fc6800
SHA11bd6824b76a73827f30db68d41c966cc949e575c
SHA256e930fd9af43c6407afdb4e04c7a2d4084cc97f2aa47ab22f8c8eda534cc54bdd
SHA512bb7010f0a899b6e1a9a89c5c20cd25ceffb328b1e2096c92a29202fc4a4a712668d7ddccfb0be3e79950b6014a40bb10a2e3acb2682c665ef04438e3603e5e23
-
Filesize
553KB
MD5f103bc66547f77ec89c00337b7fc6800
SHA11bd6824b76a73827f30db68d41c966cc949e575c
SHA256e930fd9af43c6407afdb4e04c7a2d4084cc97f2aa47ab22f8c8eda534cc54bdd
SHA512bb7010f0a899b6e1a9a89c5c20cd25ceffb328b1e2096c92a29202fc4a4a712668d7ddccfb0be3e79950b6014a40bb10a2e3acb2682c665ef04438e3603e5e23
-
Filesize
308KB
MD55d4e78018be5a1ad61ba3179d758def0
SHA1d60741a7b8b689343ee19c64c78083b9d2033b07
SHA256d7cd4998f58fe972fbb95e4f0ed26994a4357bdeaf5f454fdd80839cc35da378
SHA512fad63c1c4e0b4ef0741c1afb9e2d8a8f5953e75b4579f66ccf79193895af700eee82663f0bfece9e7f50c69cf0780dc25105d743a7136fc0097f829d1241ca0d
-
Filesize
308KB
MD55d4e78018be5a1ad61ba3179d758def0
SHA1d60741a7b8b689343ee19c64c78083b9d2033b07
SHA256d7cd4998f58fe972fbb95e4f0ed26994a4357bdeaf5f454fdd80839cc35da378
SHA512fad63c1c4e0b4ef0741c1afb9e2d8a8f5953e75b4579f66ccf79193895af700eee82663f0bfece9e7f50c69cf0780dc25105d743a7136fc0097f829d1241ca0d
-
Filesize
366KB
MD5cc782d3e956c281579436f794ee10e40
SHA1ac6c511525954e1a2d5ff3497467c0af52ad7296
SHA256e572e8ed24ac5b745f3c04f03e98f1cab562c58ecb3d854f284682ec517f359e
SHA5127541d1417cee033a81cf3caaa685ad3a7b0f08e20f9d3af2f72bb5601997fb4e43614b35b67c6e71c1b0f2bb3a0498be2aa77e9a708af00dae4aee008491c55f
-
Filesize
366KB
MD5cc782d3e956c281579436f794ee10e40
SHA1ac6c511525954e1a2d5ff3497467c0af52ad7296
SHA256e572e8ed24ac5b745f3c04f03e98f1cab562c58ecb3d854f284682ec517f359e
SHA5127541d1417cee033a81cf3caaa685ad3a7b0f08e20f9d3af2f72bb5601997fb4e43614b35b67c6e71c1b0f2bb3a0498be2aa77e9a708af00dae4aee008491c55f